Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6755: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in gameusers Game Users Share Buttons

0
High
VulnerabilityCVE-2025-6755cvecve-2025-6755cwe-22
Published: Sat Jun 28 2025 (06/28/2025, 05:29:51 UTC)
Source: CVE Database V5
Vendor/Project: gameusers
Product: Game Users Share Buttons

Description

The Game Users Share Buttons plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ajaxDeleteTheme() function in all versions up to, and including, 1.3.0. This makes it possible for Subscriber-level attackers to add arbitrary file paths (such as ../../../../wp-config.php) to the themeNameId parameter of the AJAX request, which can lead to remote code execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 15:50:01 UTC

Technical Analysis

CVE-2025-6755 is a path traversal vulnerability classified under CWE-22 found in the Game Users Share Buttons plugin for WordPress, affecting all versions up to and including 1.3.0. The vulnerability arises from insufficient validation of the themeNameId parameter in the ajaxDeleteTheme() AJAX function. An attacker with Subscriber-level privileges can craft a request that includes relative path sequences (e.g., ../../../../wp-config.php) to delete arbitrary files on the server. This arbitrary file deletion can escalate to remote code execution by removing critical files or manipulating the environment, potentially compromising the entire WordPress installation. The vulnerability requires low attack complexity and no user interaction, but does require authenticated access at the Subscriber level, which is a low-privilege role in WordPress. The CVSS 3.1 base score is 8.8, reflecting network attack vector, low complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No patches or official fixes are currently linked, and no known exploits have been reported in the wild, but the risk remains significant due to the ease of exploitation and potential damage. The vulnerability was publicly disclosed on June 28, 2025, and assigned by Wordfence.

Potential Impact

This vulnerability can have severe consequences for organizations running WordPress sites with the affected plugin. Attackers can delete critical files such as configuration files, leading to site downtime, data loss, or complete compromise of the web server. Remote code execution enables attackers to execute arbitrary commands, potentially leading to full system compromise, data breaches, or lateral movement within the network. The impact extends to confidentiality (exposure of sensitive data), integrity (unauthorized file deletion or modification), and availability (site outages). Since the vulnerability requires only Subscriber-level access, attackers can exploit it by registering or compromising low-privilege accounts, increasing the attack surface. This can affect e-commerce sites, blogs, corporate websites, and any WordPress-based infrastructure, causing reputational damage and financial loss.

Mitigation Recommendations

Immediate mitigation involves removing or disabling the Game Users Share Buttons plugin until a vendor patch is available. Administrators should restrict Subscriber-level permissions to trusted users and monitor for suspicious AJAX requests targeting the ajaxDeleteTheme function. Implementing Web Application Firewall (WAF) rules to detect and block path traversal patterns in HTTP requests can reduce risk. Regularly audit user accounts to prevent unauthorized Subscriber registrations. If possible, apply custom code fixes to sanitize and validate the themeNameId parameter rigorously, ensuring it cannot contain directory traversal sequences. Backup critical files frequently to enable recovery from deletion attacks. Monitor logs for unusual file deletion attempts and anomalous behavior. Engage with the plugin vendor or community for updates and patches. Finally, consider isolating WordPress instances and limiting file system permissions to minimize damage scope.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-26T22:17:54.592Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 685f80106f40f0eb726abc16

Added to database: 6/28/2025, 5:39:28 AM

Last enriched: 2/26/2026, 3:50:01 PM

Last updated: 3/22/2026, 6:45:27 AM

Views: 151

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses